-
Author Denny Cherry
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make r....
Release Date 2022/09 -
Network Security: Private Communications in a Public World, 3rd Edition
Author Charlie Kaufman , Radia Perlman , Mike Speciner , Ray Perlner
The classic guide to cryptography and network security -- now fully updated!"Alice and Bob are back!"Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explan....
Release Date 2022/09 -
Mastering Windows Security and Hardening - Second Edition
Author Mark Dunkerley , Matt Tumbarello
A comprehensive guide to administering and protecting the latest Windows 11 and Windows server operating system from ongoing cyber threats using zero-trust security principlesKey FeaturesLearn to protect your Windows environment using zero-trust and a multi-layered security approachImplement securit....
Release Date 2022/08 -
Windows and Linux Penetration Testing from Scratch - Second Edition
Author Phil Bramwell
Master the art of identifying and exploiting vulnerabilities with Metasploit, Empire, PowerShell, and Python, turning Kali Linux into your fighter cockpitKey FeaturesMap your client's attack surface with Kali LinuxDiscover the craft of shellcode injection and managing multiple compromises in the en....
Release Date 2022/08 -
Check Point Firewall Administration R81.10+
Author Vladimir Yakovlev , Dameon D. Welch
Improve your organization's security posture by performing routine administration tasks flawlesslyKey FeaturesGet a gradual and practical introduction to Check Point firewallsAcquire the knowledge and skills necessary for effective firewall administration, maintenance, and troubleshootingCreate and....
Release Date 2022/08 -
Author Rida Khatoun
Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to i....
Release Date 2022/08 -
Author Gregory J. Skulmoski
The demand for cybersecurity expertise is growing phenomenally; enhancing cybersecurity project skills will boost technology professionals’ careers and improve organizational cybersecurity readiness.Shields Up: Cybersecurity Project Management provides an end-to-end framework tuned for cybersecurity....
Release Date 2022/08 -
Author Amr Sukkar
This book tries to support the elaboration and implementation of strategies and to foster SMEs and entrepreneurship development.Most of businesses fall within the category of start-up, small and medium size enterprises. Therefore, governments in part of their quest to reform the economy and related ....
Release Date 2022/08 -
Author Frank Rubin
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods. In Secret Key Cryptography: ....
Release Date 2022/08 -
Modeling and Control of Modern Electrical Energy Systems
Author Masoud Karimi-Ghartemani
Modeling and Control of Modern Electrical Energy SystemsA step-by-step approach to the modeling, analysis, and control of modern electronically controlled energy systemsIn Modeling and Control of Modern Electrical Energy Systems, distinguished researcher Dr. Masoud Karimi-Ghartemani delivers a compr....
Release Date 2022/08 -
Executive's Guide to Cyber Risk
Author Siegfried Moyo
A solid, non-technical foundation to help executives and board members understand cyber riskIn the Executive's Guide to Cyber Risk: Securing the Future Today, distinguished information security and data privacy expert Siegfried Moyo delivers an incisive and foundational guidance for executives task....
Release Date 2022/08 -
Microsoft Sentinel: Planning and implementing Microsoft's cloud-native SIEM solution, 2nd Edition
Author Nicholas DiCola , Yuri Diogenes , Tiander Turpijn
Build next-generation security operations with Microsoft SentinelMicrosoft Sentinel is the scalable, cloud-native, security information and event management (SIEM) solution for automating and streamlining threat identification and response across your enterprise. Now, three leading experts guide you....
Release Date 2022/08 -
Learn Computer Forensics - Second Edition
Author William Oettinger
Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collectedKey FeaturesInvestigate the core methods of computer forensics to procure and secure advanced digital evidence skillfullyRecord the digital evidence collected and....
Release Date 2022/07 -
Hack the Cybersecurity Interview
Author Ken Underhill , Christophe Foulon , Tia Hopkins , Mari Galloway
Get your dream job and set off on the right path to achieving success in the cybersecurity field with expert tips on preparing for interviews, understanding cybersecurity roles, and moreKey FeaturesGet well-versed with the interview process for cybersecurity job rolesPrepare for SOC analyst, penetra....
Release Date 2022/07 -
Author William Puech
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data – images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveilla....
Release Date 2022/07 -
Theoretical Cybersecurity: Principles and Advanced Concepts
Author Jacob G. Oakley , Michael Butler , Wayne York , Matthew Puckett , J. Louis Sewell
There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract an....
Release Date 2022/07 -
OPNsense Beginner to Professional
Author Julio Cesar Bueno de Camargo
Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with easeKey FeaturesLearn end-to-end OPNsense firewall implementation and managementDefend against attacks by leveraging third-party plugins such as Nginx and SenseiGrasp hands-on exa....
Release Date 2022/06 -
Author David Routin , Simon Thoores , Samuel Rossier
Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, detection capabilities, and learn top adversarial simulation and emulation techniquesKey FeaturesApply real-world strategies to strengthen the capabilities of your organization's security systemLearn t....
Release Date 2022/06 -
Incident Response with Threat Intelligence
Author Roberto Martínez
Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using threat intelligenceKey FeaturesUnderstand best practices for detecting, containing, and recovering from modern cyber threatsGet practical experience embracing incident response using intelli....
Release Date 2022/06 -
Intelligent Security Management and Control in the IoT
Author Mohamed-Aymen Chalouf
The Internet of Things (IoT) has contributed greatly to the growth of data traffic on the Internet. Access technologies and object constraints associated with the IoT can cause performance and security problems. This relates to important challenges such as the control of radio communications....
Release Date 2022/06 -
Author Todd Wade
With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.
Release Date 2022/06 -
Author Alyssa Miller
Kickstart a career in cybersecurity by adapting your existing technical and non-technical skills. Author Alyssa Miller has spent fifteen years in cybersecurity leadership and talent development, and shares her unique perspective in this revealing industry guide. In Cybersecurity Career Guide you....
Release Date 2022/06 -
iOS Forensics for Investigators
Author Gianluca Tiepolo
Extract crucial data and lead successful criminal investigations by infiltrating every level of iOS devicesKey FeaturesExplore free and commercial tools for carrying out data extractions and analysis for digital forensicsLearn to look for key artifacts, recover deleted mobile data, and investigate p....
Release Date 2022/05 -
Author Peter H. Gregory , Bobby E. Rogers , Dawn Dunkerley
A fully updated self-study guide for the industry-standard information technology risk certification, CRISCWritten by information security risk experts, this complete self-study system is designed to help you prepare for—and pass—ISACA’s CRISC certification exam. CRISC Certified in Risk and Informa....
Release Date 2022/05 -
Author Pedro H. J. Nardelli
CYBER-PHYSICAL SYSTEMSProvides a unique general theory of cyber-physical systems, focusing on how physical, data, and decision processes are articulated as a complex whole Cyber-physical systems (CPS) operate in complex environments systems with integrated physical and computational capabilities. Wi....
Release Date 2022/05 -
Incident Response Techniques for Ransomware Attacks
Author Oleg Skulkin
Explore the world of modern human-operated ransomware attacks, along with covering steps to properly investigate them and collecting and analyzing cyber threat intelligence using cutting-edge methods and toolsKey FeaturesUnderstand modern human-operated cyber attacks, focusing on threat actor tactic....
Release Date 2022/04 -
Author Jean Nestor M. Dahj
Develop the analytical skills to effectively safeguard your organization by enhancing defense mechanisms, and become a proficient threat intelligence analyst to help strategic teams in making informed decisionsKey FeaturesBuild the analytics skills and practices you need for analyzing, detecting, an....
Release Date 2022/04 -
Digital Earth - Cyber threats, privacy and ethics in an age of paranoia
Author Sarah Katz
An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.
Release Date 2022/04 -
Author Mohammed Moreb
Leverage foundational concepts and practical skills in mobile device forensics to perform forensically sound criminal investigations involving the most complex mobile devices currently available on the market. Using modern tools and techniques, this book shows you how to conduct a structured investi....
Release Date 2022/04 -
Wireless Security Architecture
Author Jennifer Minella , Stephen Orr
Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutionsWireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrast....
Release Date 2022/04